Enerview Pro Privacy Policy
Who are we?
Shenzhen Atess Power Technology Co., Ltd. is a global leading distributed energy solution provider, specializing in sustainable Through this APP, we aim to provide you with intelligent and user-friendly software and services and enhance your user experience of the ATESS product family.
We respect your personal privacy rights. This Agreement is intended to explain how we collect, share and use your personal information and how you can exercise your privacy rights. If you have any questions or concerns about our use of your personal information, please contact us with the contact details shown at the bottom of this agreement.
ATESS strictly abides by laws and regulations and follows the privacy protection principles below to provide you with safer and more reliable services:
1. We do our best to prevent your information from being leaked, damaged or lost through reasonable and effective information security technology and management procedures.
2. Customized privacy setting: We provide you with various information management options so that you can make appropriate choices to manage your personal information.
3. Confidentiality of communications: We strictly abide by laws and regulations to protect your communication confidentiality and provide you with secure communication services.
4. Reasonable necessity: we only collect necessary information from you in order to provide you and other users with better services.
5. Transparency: We strive to explain the Privacy Policy to you in a concise and understandable manner so that you can clearly understand how we handle information.
6. Privacy protection in product design: We integrate the concept of privacy protection into all aspects of product or service development, and take legal, product, design and other factors into consideration in our privacy protection design.
This "Privacy Policy" mainly explains to you:
a) The types of information we collect;
b) The purposes for which we collect the information;
c) Your rights.;
Please read the "Privacy Policy" (hereinafter referred to as "this Policy") carefully to learn more about how we collect and use information, so that you can better understand our services and make appropriate choices.
If you use our services, you agree with what we have stated in this policy. Unless otherwise agreed, terms used in this policy have the same effect as terms in the Service Agreement.
If you have any questions, please contact us.
I. The types of information we collect
During your use of Enerview Pro products and services, we will collect and use personal information about you from you or third parties. We will comply with laws and regulations and follow the principles of legality, fairness, necessity and good faith. Your personal information that we collect and use includes: ① Information necessary for the core business functions of Enerview Pro and its related services. Such information is necessary for the basic operation of the APP. If you refuse to provide it, we will not be able to deliver services normally. ② Information collected by additional business functions. For such information, you can choose whether to authorize us to collect the relevant information. If you refuse to provide, you will not be able to use the related functions normally, but it will not affect the use of the core functions of the APP.
We will collect and use your personal information in the following scenarios:
(1) When you register and log in to your Enerview Pro account, we will collect the following information from you: mobile phone number, email address, and password to create your personal account and perform identity verification to ensure account security. This information is necessary for the core functions of Enerview Pro products and services. If you refuse to provide the above information, we will not be able to provide you with services.
(2) You can also use a third-party platform account (such as Facebook, or Apple) to log in. If you use a third-party platform account to log in, we will obtain relevant information (such as username, and avatar) under the third-party platform account with your authorization. And we still need your mobile phone number for authentication. If you refuse to provide the above information, you will not be able to log in with your third-party platform account, but it will not affect the regular use of other functions.
(3) The purpose of collecting and using your mobile phone number is to meet the identity information authentication requirements of relevant laws and regulations. If you refuse to provide it, you may not be able to register an account.
(4) After you log in to your account, you can further complete your information and modify your nickname and avatar. If you want to change your avatar, you will need to provide your mobile phone album authorization.
2. Connect and control equipment
When you use Enerview Pro to connect to ATESS product or a third-party device, we will need to collect your location information, Wi-Fi list information, and Bluetooth information to help you connect your phone to your device and control your devices from your phone. Once you complete the connection setup, you can monitor the running status of your device and remotely control your devices through Enerview Pro App. This is the core function of Enerview Pro APP. If you refuse to provide the above information, you will not be able to use this core function.
3. WiFi collector configuration log
When you use WiFi for network configuration, we will collect your configuration logs for information such as the configured WiFi name, your recent configuration operations, country information, and the currently used APP version, so that we can troubleshoot the reasons for WiFi collector failure, and improve the success rate of WiFi configuration as well as your network experience.
4. Device operation log
When you successfully connect your device with Enerview Pro and control it from your smart phone, we will collect your device operation log. This is used to collect abnormal records of the device, and solve problems in time to ensure your user experience.
5. Maintain the operation of the APP
During your use of Enerview Pro App, we will obtain your mobile device information, including Mac address, CPU information, memory information, SD card information, and operating system version, to collect application exception information. If there is a problem with the application, the system will report an error to ensure the stability and safety of the system.
6. Report a problem
When you have a problem to report, you can describe your problem more clearly by uploading a photo or video. If you choose to upload a photo or video, we will get your album information.
7. We may collect your IMEI code, or software installation list, only to prompt software version upgrade
The IMEI code is only used as your login identification to protect your login information and prevent unauthorized account login from different places and hacker attacks. If an abnormal login occurs, this will issue a warning and provide relevant login evidence for traceability.
II. The purpose of the collected information
We strictly abide by the provisions of laws and regulations and the agreement with users, and use the collected information for the following purposes. If we use your information beyond the following purposes, we will explain to you again and obtain your consent.
• Provide you with services.
• Allows you to personalize settings. For example, language settings, location settings, personalized help services.
• For product development and service optimization. For example, if our system fails, we will record and analyze the information generated when the system fails to optimize our service.
• For security purposes. We will use your information for identity verification, security protection, anti-fraud monitoring, archive backup, customer security services and other purposes. For example, when you download or install software, detect malicious programs or viruses, or identify fraudulent information.
• Used for software management, such as software certification, software upgrade, etc.
In order to help improve our services, enhance user experience, or for other purposes with your consent, we may use the collected information for other services we provide (subject to compliance with relevant laws and regulations). For example, the information collected when using one of our services might be used to display personalized content or advertisements to you in another service, or for purposes such as user research analysis and statistics.
To ensure the security of our services and to help us better understand how our applications are performing, we may log information such as your use frequency, failure information, overall usage, performance data, and the source of the third-party applications. We do not match the information we store in analytics software with personally identifiable information you provide in the app.
III. Management of your personal information
3.1 When using our services, you can access, modify and delete the registration information and other personal information you provide, or you can contact us with contact information provided by us. The scope and methods by which you can access, modify and delete personal information depends on the specific service you use. For example, if you want to stop sharing your geographic location information when using geographic location-related services, you can stop sharing by turning off the mobile phone positioning function, or stopping software and hardware services and communication services.
3.2 We will collect and use your information only to perform the functions of our products or services as described in this policy. If you find that we collect and use your personal information in violation of laws, administrative regulations or mutual agreement, you can ask us to delete related information. If you find that your personal information collected and stored by us is inaccurate, you can also ask us to correct it. Please contact us via the contact details set out in this policy.
3.3 When you access, modify and delete relevant information, we may require you to perform identity verification to ensure the security of your account.
3.4 Please understand that due to technical limitations, legal or regulatory requirements, we may not be able to meet all your requirements, and we will respond to your requests within a reasonable period of time.
IV. Information we share
We strictly limit the sharing of information in accordance with the provisions of laws and regulations. For example:
4.1 With your prior consent, we may share your personal information with third parties, including: Amazon, Google smart speaker voice and push services, push is only pushed to mobile phones and APPs when you open and allow;
4.2 For the purpose of operating and maintaining services, we may cooperate with third-party partners (third-party service providers, contractors, application developers, etc., for example, service providers that send emails or push notifications on our behalf, or map service providers who provide us with location services) (they may not be located in your jurisdiction) and for the following purposes:
4.2.1 To provide you with our services;
4.2.2 To provide you with remote, offline and other operation and maintenance services through the platform;
4.2.3 To achieve the purposes described in the “The purpose of the collected information” section;
4.2.4 To perform our obligations and exercise our rights under the Service Agreement or this Policy;
4.2.5 To understand, maintain and improve our services. If we share your information with a third party, we will use encryption, anonymization and other means to ensure the security of your information.
4.3 We may disclose your personal information for the following purposes:
4.3.1 To comply with applicable laws and regulations and other relevant regulations;
4.3.2 To comply with court judgments, rulings or other legal proceedings;
4.3.3 To comply with the requirements of relevant government agencies or other legally authorized organizations;
4.3.4 When we have reason to believe that we need to comply with relevant regulations such as laws and regulations;
4.3.5 In order to implement the relevant service agreement or this policy, maintain the public interest, and protect the personal and property safety of our customers, us or our affiliated companies, other users or employees, or other legitimate and necessary purposes.
V. Information we may send to you
5.1 Service-related announcements
We may send you service-related announcements when necessary (for example, when a service is suspended due to system maintenance). You may not be able to turn off these service-related, non-advertising announcements.
VI. Location and duration of stored information
6.1 Location of stored information
To comply with laws and regulations, we will store all collected personal information of users within their local territory.
6.2 Duration of stored information
In general, we will only retain your personal information for the shortest period necessary to achieve the purposes. However, under the following circumstances, we may change the storage period of personal information as required by laws:
6.2.1 To comply with applicable laws and regulations;
6.2.2 To comply with court judgments, rulings or other legal proceedings;
6.2.3 To comply with the requirements of relevant government agencies or legally authorized organizations;
6.2.4 When we have reason to believe that we need to comply with relevant regulations such as laws and regulations;
6.2.5 In order to implement the relevant service agreement or this policy, maintain the public interest, and protect the personal and property safety of our customers, us or our affiliated companies, other users or employees, or other legitimate and necessary purposes.
6.2.6 For users who have not been active for a long time and have no data transmission for more than a certain period of time, ATESS may periodically clear the data.
When our products or services stop operating, we will notify you by means of push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period.
VII. Information security
We provide appropriate security measures for your information to prevent its loss, improper use, unauthorized access or disclosure.
7.1 We strictly abide by laws and regulations to protect user information.
7.2 We will use various security protection measures within a reasonable security level to ensure the security of information. For example, we use encryption technology (e.g., TLS, SSL, MD5), anonymization and other means to protect your personal information.
7.3 We establish special management systems, processes and organizations to ensure information security. For example, we strictly limit the scope of people who have access to information, require them to comply with confidentiality obligations, and conduct personnel reviews.
7.4 In the event of a security incident such as personal information leakage, we will activate emergency plans to prevent the expansion of the security incident, and notify you in the forms of push notifications, announcements, etc.
VIII. Scope of application
This policy applies to all our services. However, some services have specific privacy guidelines/statements that are more specific about how we handle your information in that specific service. In the event of any inconsistency between this policy and the privacy guidelines/statements of a specific service, the specific privacy guidelines/statements shall prevail.
Please note that this policy does not apply to services provided by other companies or individuals. For example, you log in to services provided by other companies or individuals by using your account.
Your use of these third-party services is subject to their privacy policies (not this policy), and you need to read their policies carefully.
IX. How your data is transferred around the world
ATESS is a multinational company, which means that your data collected by ATESS may be accessed, stored and processed in the country/region where you use products or services; or in other countries/regions where ATESS or its Affiliates, subsidiaries or service providers, business partners locate. Data protection laws in these countries may differ. In such cases, we take steps to ensure that the data we collect is processed in accordance with the requirements of this Policy and applicable laws. This includes the use of various legal mechanisms, such as signing standard contractual clauses approved by the European Commission or requesting your cross-border Consent to transfer data, or implementing security measures such as data anonymization prior to cross-border data transfers.
X. Your rights as a data subject
At any point in our possession or processing of your personal data, you, as a data subject, reserve the following rights:
• Right of access - you have the right to request a piece of information we hold about you.
• Right to rectification - you have the right to rectify any inaccuracies or incompleteness in the data we hold about you.
• Right to Forget - In certain circumstances, you may request that the data we hold about you be deleted from our records.
• Right to Restriction of Processing - Under certain conditions, the right to restrict processing applies.
• Right to Portability - You have the right to transfer data we hold about you to another organization.
• Right to object - you have the right to object to certain types of processing, such as direct marketing.
• Right to object to automated processing (including profiling) - You have the right to receive the legal effects of automated processing or profiling.
• Right to Judicial Review: If the organization rejects your application under the right of access, we will explain why. All requests above will be sent if third parties are involved in the processing of your personal data.
XI. Agreeing to this policy
Agreeing to this Privacy Policy means that you allow us to process your personal data for the specified purposes. ATESS processing of your personal data requires your consent. If we ask you to provide sensitive data, we will tell you why and how this information is used. You may withdraw your consent at any time (contact ATESS at info@atesspower.com).
XII. Complaints
If you wish to lodge a complaint about the way ATESS has handled your personal data or handled your complaint, you have the right to lodge a complaint directly with the supervisory authority and the data protection representative in the name of the organization, the Data Protection Officer/GDPR owner.
XIII. Contact us
If you have any questions about this policy or other related matters, you can fill in the relevant information according to the guidelines provided by us, and send your questions to info@atesspower.com. We will review the issue as soon as possible and respond after verifying your user identity.
XIV. Changes to the Privacy Agreement
14.1 We may revise the content of this policy over time. If such changes will lead to substantial derogation of your rights under this policy, we will notify you by prompting a prominent position on the page before the changes take effect. In such a case, by continuing to use our services, you agree to be bound by the revised policy. For major revisions, we will also provide more prominent notices (including for some services, we will notify through website announcements, explaining the specific changes to the privacy policy).
Significant changes referred to in this policy include, but are not limited to:
14.2 Significant changes to our service model. Such as the purpose of processing user information, the type of user information processed, the way of using user information, etc.
14.3 We have undergone major changes in terms of control and organizational structure. Such as business adjustments, bankruptcy mergers and acquisitions, etc. caused by changes in owners, etc.;
14.4 Changes in the main objects of user information sharing, transfer or public disclosure;
14.5 Significant changes in your rights to participate in user information processing and how to exercise them;
14.6 When contact information and complaint channels of our responsible department for handling user information security change;
14.7 When the user information security impact assessment report indicates that there is a high risk.
14.8 We recommend that you regularly review our privacy practices for updates. Your continued use of the Services on your mobile phone and/or any other device will be deemed acceptance of the updated Privacy Policy.